Networking essentials, 6th edition beasley - The ebook in PDF/DOCX format is available for instant d

Page 1


https://ebookmass.com/product/networking-essentials-6th-

Instant digital products (PDF, ePub, MOBI) ready for you

Download now and discover formats that fit your needs...

Networking Essentials: A CompTIA Network+ N10-006 Textbook 4th Edition Beasley

https://ebookmass.com/product/networking-essentials-a-comptianetwork-n10-006-textbook-4th-edition-beasley/

ebookmass.com

Guide to Networking Essentials (MindTap Course List) 8th Edition Greg Tomsho

https://ebookmass.com/product/guide-to-networking-essentials-mindtapcourse-list-8th-edition-greg-tomsho/

ebookmass.com

Mosbyu2019s Essentials for Nursing Assistants 6th Edition

https://ebookmass.com/product/mosbys-essentials-for-nursingassistants-6th-edition/

ebookmass.com

Cardiology Secrets, 6th Edition Glenn N. Levine

https://ebookmass.com/product/cardiology-secrets-6th-edition-glenn-nlevine/

ebookmass.com

Sydney and Its Waterway in Australian Literary Modernism

1st Edition Meg Brayshaw

https://ebookmass.com/product/sydney-and-its-waterway-in-australianliterary-modernism-1st-edition-meg-brayshaw/

ebookmass.com

Cheating Academic Integrity : Lessons from 30 Years of Research David A. Rettinger

https://ebookmass.com/product/cheating-academic-integrity-lessonsfrom-30-years-of-research-david-a-rettinger/

ebookmass.com

The Midnight Girls: Sapphic Monster Girl Romance Alicia Jasinska

https://ebookmass.com/product/the-midnight-girls-sapphic-monster-girlromance-alicia-jasinska/

ebookmass.com

The Philosopher of Palo Alto: Mark Weiser, Xerox PARC, and the Original Internet of Things John Tinnell

https://ebookmass.com/product/the-philosopher-of-palo-alto-markweiser-xerox-parc-and-the-original-internet-of-things-john-tinnell/

ebookmass.com

Best Explanations: New Essays on Inference to the Best Explanation Kevin Mccain And Ted Poston (Eds.)

https://ebookmass.com/product/best-explanations-new-essays-oninference-to-the-best-explanation-kevin-mccain-and-ted-poston-eds/

ebookmass.com

Qualitative Theory of ODEs: An Introduction to Dynamical Systems Theory 1st Edition Henryk Zoladek

https://ebookmass.com/product/qualitative-theory-of-odes-anintroduction-to-dynamical-systems-theory-1st-edition-henryk-zoladek/

ebookmass.com

INSTRUCTOR EDITION

JEFFREY S. BEASLEY AND PIYASAT NILKAEW

Networking Essentials: Sixth Edition

Instructor Edition

Copyright © 2022 by Pearson Education, Inc.

All rights reserved. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearson.com/permissions.

No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.

ISBN-13: 978-0-13-745582-9

ISBN-10: 0-13-745582-8

Library of Congress Control Number: 2021913557

ScoutAutomatedPrintCode

Trademarks

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book.

Special Sales

For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419.

For government sales inquiries, please contact governmentsales@pearsoned.com. For questions about sales outside the U.S., please contact intlcs@pearson.com.

EDITOR-IN-CHIEF

Mark Taber

DIRECTOR, ITP PRODUCT MANAGEMENT

Brett Bartow

DEVELOPMENT EDITOR

Marianne Bartow

MANAGING EDITOR

Sandra Schroeder

PROJECT EDITOR

Mandie Frank

COPY EDITOR

Kitty Wilson

INDEXER

Ken Johnson

PROOFREADER

Abigail Manheim

TECHNICAL EDITOR

Chris Crayton

PEER REVIEWERS

DeAnnia Clements

Osman Guzide

Gene Carwile

Dr. Theodor Richardson

PUBLISHING COORDINATOR

Cindy Teeters

DESIGNER

Chuti Prasertsith

COMPOSITOR codeMantra

CREDITS

Figure 1-8

Figure 1-9

Screenshot of The command prompt in Windows 10 © Microsoft 2020

Screenshot of A typical text screen result when entering the ipconfig /all command in the command window.

© Microsoft 2020

Figure 1-15 courtesy for Linksys

Figure 1-18 courtesy Zoom Telephonics, Inc.

Figure 1-19 courtesy for Linksys

Figure 1-27

Figure 2-34

Screenshot of (a) An example of displaying the IP address for computer 1 using the ipconfig command in Windows and (b) an example of the displayed IP address in macOS for the built-in Ethernet connection © Microsoft 2020

Screenshot of DTX-1800 certification report: Failure due to a termination problem. ©Fluke Corporation

Figure 2-35 Screenshot of DTX-1800 certification report: Failure due to excessive insertion loss. ©Fluke Corporation

Figure 2-36

Figure 2-37

Screenshot of The certification report for Test 1, showing that a short jumper cable passes the CAT5e link test.

©Fluke Corporation

Screenshot of The results for Test 2, showing that the cable failed the CAT5e link test. ©Fluke Corporation

Figure 2-38 Screenshot of The Test 3 CAT5e link test, showing failures with attenuation. ©Fluke Corporation

Figure 2-39 Screenshot of A CAT5e link test, showing failures with delay skew (Test 4). ©Fluke Corporation

Unnumbered

Figure 2-1

Unnumbered

Figure 2-2

Unnumbered

Figure 2-3

Screenshot of Answer the following questions related to the certification report shown here. ©Fluke Corporation

Screenshot of Answer the following questions related to the certification report shown here. ©Fluke Corporation

Screenshot of Answer the following questions related to the certification report shown here - OMNI Scanner. ©Fluke Corporation

Figure 4-7 Screenshot of An example of the information displayed when an association is formed between a client and an access point. © Microsoft 2020

Figure 4-8

Screenshot of An example of a lost association. © Microsoft 2020

Figure 4-18 Screenshot of The window for configuring Bluetooth settings on a Mac. © 2020 Apple Inc

Figure 4-19 Screenshot of The Mac window showing the settings for a file transfer. © 2020 Apple Inc

Figure 4-20 Screenshot of The Mac window showing that a text file is coming in from another Bluetooth device. © 2020 Apple Inc

Figure 4-28

Screenshot of The excellent signal quality measured for the multipoint distribution. © Microsoft 2020

Figure 4-29 Screenshot of The poor signal quality measured at the remote site near the lake. © Microsoft 2020

Figure 5-7 Screenshot of The data traffic captured by computer 2 for the LAN using a hub. © Microsoft 2020

Figure 5-8 Screenshot of The data traffic captured by computer 2 for the LAN using a switch. © Microsoft 2020

Figure 5-9 Screenshot of The startup menu of a Cisco Catalyst switch in the CNA software. © Microsoft 2020

Figure 5-10 Screenshot of The highlighted ports showing the current connections and the location of the stacked switches icon. © Microsoft 2020

Figure 5-11 Screenshot of The window listing the MAC addresses currently connected to a switch. © Microsoft 2020

Figure 5-13 Screenshot of Configuring an IP address on an interface. © Microsoft 2020

Figure 5-19 Screenshot of Putty configuration © 1997-2020 Simon Tatham

Figure 5-20 Screenshot of The HyperTerminal Connect To dialog © 1997-2020 Simon Tatham

Figure 5-21 Screenshot of The Properties dialogs for configuring the serial port connection PuTTY © 1997-2020 Simon Tatham

Figure 5-23 Screenshot of The macOS dialog for configuring the settings for the serial interface. © 2020 Apple Inc

Figure 5-24 Screenshot of The macOS dialog for setting the serial port to PL2303-000. © 2020 Apple Inc

Figure 5-25 Screenshot of The macOS window listing the serial communication link settings. © 2020 Apple Inc

Figure 6-6 Screenshot of An example of the three packets exchanged in the initial TCP handshake. © Microsoft 2020

Figure 6-8 Screenshot of An example of the four-packet TCP connection termination. © Microsoft 2020

Figure 6-10 Screenshot of An example of a UDP packet transfer. © Microsoft 2020

Figure 6-12 Screenshot of Captured packets showing the (a) ARP request and the (b) ARP reply. © Microsoft 2020

Figure 6-13 Screenshot of The details of the ARP broadcast packet. © Microsoft 2020

Figure 6-14 Screenshot of An example of the use of hex numbers in data packets. © Microsoft 2020

Figure 7-3 Screenshot of The TCP/IP dialog for setting the default gateway address for computer A1. © Microsoft 2020

Figure 7-6 Screenshot of The Net-Challenge screen. © Microsoft 2020

Figure 7-7 Screenshot of The check box window for the Net-Challenge software User EXEC Mode challenge.

© Microsoft 2020

Figure 7-8 Screenshot of The display for step 6, using the show command. © Microsoft 2020

Figure 7-11

Figure 7-14

Figure 9-1a

Figure 9-1b

FIG10-4

FIG10-9

FIG10-11

FIG10-12

FIG10-23

FIG10-24

FIG10-25

FIG10-26

FIG10-27

FIG10-28

FIG10-30

FIG10-31

FIG11-9

Screenshot of The network topology for Net-Challenge. The arrows indicate where to click to display the router IP address configurations. © Microsoft 2020

Screenshot of An example of the port management options available with a Cisco switch: (a) Speed auto-negotiation option; (b) Duplex auto option. © Microsoft 2020

Screenshot of Setting the default gateway address or default static route on a host computer (PC). © Microsoft 2020

Screenshot of Setting the default gateway address or default static route on a host computer (macOS). © Microsoft 2020

Screenshot of Captured DHCP packets. © Microsoft 2020

Screenshot of An example of using an SNMP software management tool to obtain descriptions of a router’s interfaces using the MIB ifDescr. © Microsoft 2020

Screenshot of Using an SNMP software management tool to obtain interface speed settings. © Microsoft 2020

Screenshot of An example of using SNMP to collect data traffic statistics. © Microsoft 2020

Screenshot of Initializing Wireshark to capture data packets from a network. © Microsoft 2020

Screenshot of Starting a capture. © Microsoft 2020

Screenshot of The captured packets showing the ping from computer 1 to computer 2. © Microsoft 2020

Screenshot of Computer 2 replying to computer 1 with its MAC address. © Microsoft 2020

Screenshot of Computer 1 is sending an echo request to computer 2. © Microsoft 2020

Screenshot of The echo reply received by computer 1. © Microsoft 2020

Screenshot of (a) The beginning of the FTP data packet transfer and the request for an ASCII data transfer by the client. (b) The FTP data packet transfer and the closing of the FTP transfer. © Microsoft 2020

Screenshot of Figure for problems 64–68. © Microsoft 2020

Screenshot of Windows Firewall in Windows 10. © Microsoft 2020

FIG11-10 Screenshot of Windows 10 Firewall status. © Microsoft 2020

FIG11-11

FIG11-12

Screenshot of Windows 10 allowed apps. © Microsoft 2020

Screenshot of Windows 10 advanced firewall settings. © Microsoft 2020

FIG11-13 Screenshot of Windows 10 echo request properties. © Microsoft 2020

FIG11-14 Screenshot of Windows 10 echo request protocols and ports. © Microsoft 2020

FIG11-15

Screenshot of macOS firewall. © 2020 Apple Inc

FIG11-16 Screenshot of macOS advanced settings. © 2020 Apple Inc

FIG11-17 Screenshot of Linux iptables © The Netfilter’s webmasters

FIG11-19

Screenshot of An example of setting WEP encryption on a wireless client. © Microsoft 2020

FIG11-26 Screenshot of The traceroute from the VPN server to the VPN remote client. © Microsoft 2020

FIG11-27 Screenshot of The first window, the VPN Client status window, is displayed after starting the VPN client software. © Cisco systems

FIG11-28

Screenshot of The connection screen for establishing a VPN link. © Cisco systems

FIG11-29 Screenshot of The initial handshake screen for the VPN client. © Cisco systems

FIG11-30 Screenshot of The menu showing that the VPN client has successfully connected to the virtual private network. © Cisco systems

FIG11-31 Screenshot of The Preferences window for the VPN client. © Cisco systems

FIG11-32 Screenshot of The Statistics window (a) and Route Details window (b) for the VPN client. © Cisco systems

FIG12-1 Screenshot of Enabling Hyper-V © Microsoft 2020

FIG12-2 Screenshot of Using Hyper-V Manager © Microsoft 2020

FIG12-3 Screenshot of Creating a virtual switch in Hyper-V © Microsoft 2020

FIG12-4 Screenshot of Specifying the name of a virtual switch © Microsoft 2020

FIG12-5 Screenshot of Creating a virtual machine © Microsoft 2020

FIG12-6 Screenshot of Specifying the name and location of a virtual machine. © Microsoft 2020

FIG12-7 Screenshot of Specifying the generation of the virtual machine © Microsoft 2020

FIG12-8 Screenshot of Specifying the desired memory size for a VM. © Microsoft 2020

FIG12-9 Screenshot of Selecting the connection name of the virtual switch. © Microsoft 2020

FIG12-10 Screenshot of Specifying a virtual hard disk name, location, and size. © Microsoft 2020

FIG12-11 Screenshot of The options for installing the VM’s operating system. © Microsoft 2020

FIG12-12 Screenshot of Starting the new VM. © Microsoft 2020

FIG12-13 Screenshot of The final VM screen, showing that the machine is up. © Microsoft 2020 Peter Mell (NIST), Tim Grance (NIST), The NIST Definition of Cloud Computing, SP 800-145

Cover Artistdesign29/Shutterstock

ABOUT THE AUTHORS

Jeffrey S. Beasley is a professor emeritus in the Information and Communications Technology program at New Mexico State University, where he taught computer networking and many related topics. He is coauthor of Modern Electronic Communication, ninth edition, the author of Networking, second edition, and co-author of Networking Essentials, fifth edition, and A Practical Guide to Advanced Networking. Piyasat Nilkaew is the director of Computing and Networking Infrastructure at New Mexico State University and has more than 20 years of experience in network management and consulting. He has extensive expertise in deploying and integrating multiprotocol and multivendor data, voice, and video network solutions. He is co-author of Networking Essentials, fifth edition, and A Practical Guide to Advanced Networking.

ABOUT THE TECHNICAL REVIEWER

Chris Crayton is a technical consultant, trainer, author, and industry-leading technical editor. He has worked as a computer technology and networking instructor, information security director, network administrator, network engineer, and PC specialist. Chris has authored several print and online books on PC repair, CompTIA A+, CompTIA Security+, and Microsoft Windows. He has also served as technical editor and content contributor on numerous technical titles for several of the leading publishing companies. He holds numerous industry certifications, has been recognized with many professional and teaching awards, and has served as a state-level SkillsUSA final competition judge. Chris tech edited and contributed to this book to make it better for students and those wishing to better their lives.

DEDICATIONS

This book is dedicated to my family: Kim, Damon/Heather, and Dana/Sam. —Jeff Beasley

This book is dedicated to my family: Boonsong, Pariya, June, Ariya, and Atisat. —Piyasat Nilkaew

ACKNOWLEDGMENTS

I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical consultants:

● Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded twisted-pair cabling

● Don Yates for his help with the initial Net-Challenge software

I would also like to thank my many past and present students for their help with this book:

● Abel Sanchez, Kathryn Sager, and Joshua Cook for their work on the Net-Challenge software; Adam Segura for his help taking pictures of the steps for CAT6 termination; Marc Montez, Carine George-Morris, Brian Morales, Michael Thomas, Jacob Ulibarri, Scott Leppelman, and Aarin Buskirk for their help with laboratory development; Josiah Jones and Raul Marquez Jr. for their help with the Wireshark material; and Ariya Nilkaew for her help with revising and editing many of the captured pictures

● Aaron Shapiro and Aaron Jackson for their help testing the many network connections presented in the text

● Paul Bueno and Anthony Bueno for reading through an early draft of the text

Your efforts are greatly appreciated.

We appreciate the excellent feedback of the following reviewers: Phillip Davis, DelMar College, Texas; Thomas D. Edwards, Carteret Community College, North Carolina; William Hessmiller, Editors & Training Associates; Bill Liu, DeVry University, California; and Timothy Staley, DeVry University, Texas.

Our thanks to the people at Pearson for making this project possible. Thanks to Brett Bartow for providing us with the opportunity to work on the sixth edition and for helping make this process enjoyable. Thanks to Marianne Bartow, to all the people at Pearson IT Certification, and also to the many technical editors for their help editing the manuscript.

Special thanks to our families for their continued support and patience.

WE WANT TO HEAR FROM YOU!

—Jeffrey S. Beasley and Piyasat Nilkaew

As the reader of this book, you are our most important critic and commentator. We value your opinion and want to know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any other words of wisdom you’re willing to pass our way.

We welcome your comments. You can email or write to let us know what you did or didn’t like about this book— as well as what we can do to make our books better.

Please note that we cannot help you with technical problems related to the topic of this book.

When you write, please be sure to include this book’s title and author as well as your name and email address. We will carefully review your comments and share them with the authors and editors who worked on the book.

Email: community@informit.com

READER SERVICES

Register your copy of Networking Essentials, Sixth Edition at www.pearsonitcertification.com for convenient access to downloads, updates, and corrections as they become available. To start the registration process, go to www.pearsonitcertification.com/register and log in or create an account.* Enter the product ISBN 9780137455928 and click Submit. When the process is complete, you will find any available bonus content under Registered Products.

*Be sure to check the box that you would like to hear from us to receive exclusive discounts on future editions of this product.

INTRODUCTION

This book provides a look at computer networking from the point of view of a network administrator. It guides readers from an entry-level knowledge of computer networks to advanced concepts related to Ethernet networks; router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network security; wireless networking; optical networks; voice over IP; network servers; and Linux networking. After reading the entire text, you will have gained a solid knowledge base in computer networks.

In our years of teaching, we have observed that technology students prefer to learn “how to swim” after they have gotten wet and taken in a little water. Then they are ready for more challenges. In this book, we therefore show you the technology, how it is used, and why, and you can take the applications of the technology to the next level. Allowing you to experiment with the technology helps you develop a greater understanding.

ORGANIZATION OF THE TEXT

This book has been thoroughly updated to reflect the latest version of the CompTIA Network+ exam. Networking Essentials, sixth edition, is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of the network administrator, it requires absolutely no previous experience with either network concepts or day-to-day network management. Throughout the text, you will gain an appreciation of how basic computer networks and related hardware are interconnected to form a network. You will come to understand the concepts of twisted-pair cable, fiber optics, LANs interconnection, TCP/IP configuration, subnet masking, basic router configuration, switch configuration and management, wireless networking, and network security.

The textbook’s companion website contains laboratory exercises, the Net-Challenge software, Wireshark captures, and the Network+ terminology quizzes.

Key Pedagogical Features

● The Chapter Outline, Network+ Objectives, Key Terms, and Introduction at the beginning of each chapter clearly outline specific goals for you, the reader. Figure I-1 shows an example of these features.

Chapter Outline Chapter Objectives

Introduction: Chapter openers clearly outline specific goals

Key Terms for this Chapter

174

FIGURE I-1

● The Net-Challenge software provides simulated hands-on experience configuring routers and switches. Exercises provided in the text (see Figure I-2) and companion website challenge you to undertake certain router/network configuration tasks. These challenges help you check your ability to enter basic networking commands and to set up router functions, such as configuring the interface (Ethernet and serial) and routing protocols (for example, RIP, static). The software has the look and feel of actually being connected to a router’s console port.

Net-Challenge exercises are found throughout the text where applicable

Exercises challenge readers to undertake certain tasks

FIGURE I-2

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.